StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Many Forms of Cybercrime - Essay Example

Cite this document
Summary
The paper "Many Forms of Cybercrime" highlights that the legal way of pursuing the individuals committing this cybercrime would be to pursue the individuals in court. However, a better way would be by shutting down the sites that enable file-sharing…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.4% of users find it useful
Many Forms of Cybercrime
Read Text Preview

Extract of sample "Many Forms of Cybercrime"

Download file to see previous pages

Data breaches can be combatted by proper timing data or by individual businesses informing consumers about their rights regarding the use of their data. Illegal downloads can be combatted by actions by the music artists themselves, as well as remedies that involve shutting down the sites that sponsor the downloads. Child pornography, in and of itself, is best combatted with legal means, such as criminal prosecution. However, the two types of pornography that are examined in this paper – extreme pornography between adults and child pornography that involves characters - should be dealt with in other means.

The data breach section examines United States law, as does the section regarding illegal downloads. The pornography section involves UK law. Hence, the topics are examined with a multinational perspective, which is the best way to examine these topics, as these topics are global. Cybercrime – Data Breaches One major example of cybercrime is the data breach, which results in “the distribution of personal information 'beyond the bounds. consent and expectations.'”1 These breaches may be the result of an unauthorized person accessing a company's database or might be the result of an employee losing his or her laptop or another portable storage device.

These are only some of the ways that breaches might result, and there are many more. 50% of the data breaches are committed by employees of the company that is breached.2 Breaches can lead to identity theft and fraud, such as when TJX Companies, Inc., the operator of TJ Maxx and Marshall stores in the United States, announced in January 2007 that it was the victim of a security breach, which exposed 94 million credit card records to outsiders, and these outsiders made fraudulent credit card purchases with this information about TJX customers.

3 Since the cardholders had to pay for the fraudulent charges, not the individual customers, the banks who issued these cards filed suit against TJX and won a $41 million verdict ordering TJX to pay to reimburse them for their losses.4 Moreover, since up to 400,000 of the TJX records included their customer's social security numbers and driver's license numbers, the thieves were able to steal identities as well.5 Stealing social security numbers is an infinitely more serious problem than accessing the individual's credit cards, as identity thieves can use the social security number to open up new accounts for which the individual is responsible, and gives the thief “virtual keys” to the victim's financial life,6 enabling the thief to “empty bank accounts, obtain credit cards, secure loans, open lines of credit, connect telephone services, and enroll in government benefits in the victim's name,”7 while merely stealing credit card information only leaves the individual with the inconvenience of having to close that particular account.

Moreover, “[i]dentity thieves also commit crimes in the victim's names. A victim of criminal impersonation risks arrest and a criminal record for an identity thief's transgression”8 Breaches resulting in thefts of social security numbers are very expensive and time-consuming for the victims, as they spend an average of $1,000 in out-of-pocket expenses and 600 hours in personal time cleaning up the mess, and lose on average $16,791.9 The risks of social security numbers and other personal information falling into the wrong hands can also be deadly, as in the case of the information broker who sold a woman's social security and employment information to the woman's stalker, who used this information to track her down and kill her.

...Download file to see next pages Read More
Tags
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Cybercrime Essay Example | Topics and Well Written Essays - 4500 words”, n.d.)
Retrieved from https://studentshare.org/environmental-studies/1413251-cybercrime
(Cybercrime Essay Example | Topics and Well Written Essays - 4500 Words)
https://studentshare.org/environmental-studies/1413251-cybercrime.
“Cybercrime Essay Example | Topics and Well Written Essays - 4500 Words”, n.d. https://studentshare.org/environmental-studies/1413251-cybercrime.
  • Cited: 0 times

CHECK THESE SAMPLES OF Many Forms of Cybercrime

How can we safeguard against the cybercrime

If that is true, what will be the major types of cybercrime?... cybercrime is also part of white collar crime and is seen as the most sophisticated type of crime in the 21st century.... cybercrime is also part of white collar crime and is seen as the most sophisticated type of crime in the 21st century.... A number of nations and governments are working round the clock with specialized units to help in stopping cybercrime.... cybercrime: The transformation of crime in the information age....
3 Pages (750 words) Essay

Constitutional Challenges Associated With Investigating Cybercrimes

Technological developments especially in respect to cyberspace have been inarguably beneficial to human beings and have positively impacted on how they conduct business and how they live (Ditzion, et al.... 2003).... .... ... ... The rapid internet growth has enormously expanded the means of communications....
10 Pages (2500 words) Term Paper

Cybercrime and Privacy

Significance, scope and extent of the problem: “Undeterred by the prospect of arrest or prosecution, cyber criminals around the world lurk on the Net as an omnipresent menace to the financial health of businesses, to the trust of their customers, and as an emerging threat to nations' security” Marc Goodman The study of cybercrime raises several critical questions regarding the protection of privacy and more specifically the increasing loss of privacy.... The issue of cybercrime, has been growing consistently and is now known to be one of the most serious and globally recognized internet crimes in recent times, causing millions of dollars worth of losses every year in the U....
9 Pages (2250 words) Research Paper

Cybercrime - Illegitimate Use of Internet

The origin of cybercrime can be attributed to the technological advancements of the late 1980s and the 1990s.... The deterioration of ethical values was also a major result of cybercrime.... As the paper "cybercrime - Illegitimate Use of Internet" tells, computer technologies and the internet have become essential elements in the day-to-day life of individuals.... Illegitimate uses of these services through the internet, as a source of adequate information and economically beneficial way of communication, have become a prime cause of criminal activities over the internet, commonly referred to as 'cybercrime'....
9 Pages (2250 words) Research Paper

The Latest from Computer Forensics

hen the Internet got into the hands of many people and that life has become intertwined with it, more and more people have become susceptible to crimes committed via the Internet, usually termed cybercrime.... This paper shall survey the emerging technologies that are being used against cybercrime.... The FBI reports an annual loss of about $ 67 Billion due to such acts (cybercrime, 2007).... Upon an incident involving a cybercrime, certain files may be generated....
7 Pages (1750 words) Essay

The Cybercrime: Identity Theft

While many types of cybercrime require a high degree of organization and specialization, there is insufficient empirical evidence to ascertain if cybercrime is now dominated by organized crime groups and what form or structure such groups may take (Lusthaus, 2013).... This assignment "The cybercrime: Identity Theft" discusses cybercrimes that are among the most dangerous crimes in the modern world.... Also, there are citations from such works as cybercrime: Criminal Threats from Cyberspace by Susan W....
4 Pages (1000 words) Assignment

Cyber Crime in the United Arab Emirates

ackground of the StudyLegal system all over the world is experiencing huge challenges in a plight to discourse the issue of cybercrime.... cybercrime is a comparatively modern type of offence with which the offenders can easily carry out the offences through the use of a computer or even through smartphones.... cybercrime is considered a very quickly growing domain of crime that is complicated and assorted in nature (Kersten and Jansen 590).... While law authorities are busy trying to root out his problem, very many individuals are becoming victims of such crimes of hacking and identity theft (EFG 23)....
8 Pages (2000 words) Report

Differences between Investigating Traditional Criminal Offences and Cyber Offences

In addition, the effects of cybercrime may be felt across a large area and even across many countries when the systems such as computers that are used to commit the crimes are interconnected.... ased on the background information above, this essay will discuss various aspects of cybercrime and dealing with electronic evidence.... This is because it is the nature of the differences between the two forms of crime that forms the basis for the differences that exist when investigating the two kinds of crime....
12 Pages (3000 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us